(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

Disclosed is a means of transaction management for distributed data applications when it is impractical to apply methods such as those imbedded in distributed database management systems.

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
30% of the total text.

Client Server Algorithm for Distributed Libraries

Disclosed is
a means of transaction management for
distributed data applications when it is impractical to apply methods
such as those imbedded in distributed database management systems.

Distributed
library services require that each patron be able
to use his favorite workstation to exploit libraries in whatever
computing environments library custodians choose. This means that
simple, standard protocols should connect varied clients to varied
servers with varied communication protocols.
Atomic transactions are
needed to implement data integrity.

The invention
is a distributed algorithm. The server
part
ensures atomic actions for any blend of conversational and batch
sessions and protects against security violations. The client part
allows each application both synchronous and asynchronous
interactions, buffering the application from behavior of the
communications vehicle. Together, the
two portions decouple
transaction boundaries from network message boundaries.

The algorithm
provides economical transaction management for
any distributed database application in which each "clump" of data
has a single point of control.
CLIENT/SERVER PROTOCOL

Referring to
the figure, each data service (Connect, Store,
Retrieve, ...) consists of a client part and a server part. Each
client drives its server by a transmitted order, which stimulates a
reply. A sequence of such orders is
called a request and evokes a
response. Valid requests conform to the
abstract syntax:
request ::= step
step ::= initiator order
initiator ::= connect-order | prefix
connect-order ::= patronid
libraryid timestamp
capability password
prefix ::= patronid libraryid timestamp
capability
order ::= store-order | retrieve-order |
transform-order
| ... | commit-order
commit-order ::= commit | rollback
A response is a sequence of messages and results.
response ::= reply*
reply ::= message resultmessage ::= class
code [value]
result ::= code [value]
request ::= step: a request from a client is sequence of
steps.
Its simplest form is a single conversational step. However, a
request may be a batch with many orders which are partitioned into
individual transactions by commit orders.
step ::= initiator order: an initiator begins each step to identify
the patron for whom orders are being issued, the library which is to
be accessed, and the current value of the requestor's clock. This
initiator is similar to a batch "job card".
initiator ::= connect-order | prefix: an initiator can be either a
Connect invocation or a slightly shorter prefix.
order...